E-voting in Nigeria: A survey of voters' perception of security and other trust factors O Osho, VL Yisa, OJ Jebutu 2015 International Conference on Cyberspace (CYBER-Abuja), 202-211, 2015 | 17 | 2015 |
Mobile spamming in Nigeria: An empirical survey O Osho, VL Yisa, OY Ogunleke 2015 International Conference on Cyberspace (CYBER-Abuja), 150-159, 2015 | 4 | 2015 |
Application of Geo-Location-Based Access Control in an Enterprise Environment AS Victor L. Yisa, Baba Meshach, Oluwafemi Osho International Journal of Computer Network and Information Security(IJCNIS …, 2018 | 2* | 2018 |
Evaluation of Business Continuity and Information Disaster Recovery Mechanism in Top Universities in North Cyprus MB Victor Legbo YISA International Journal of Emerging Science and Engineering 2 (11), 19-27, 2014 | 2* | 2014 |
A review of top open source password cracking tools V Yisa, M Baba, E Olaniyi Proc. of the International Conference on Information and Communication …, 2016 | 1 | 2016 |
Online Social Networks: A Survey of Usage and Risks Experience among University Students in North-Central Nigeria VL Yisa, O Osho, I Soje International Conference on Information and Communication Technology and Its …, 2016 | 1 | 2016 |
Towards a Digital Policing in Developing Nations: The Nigerian Context I Ismaila, VY Legbo, AR Ikuesan, SA Imavah, AB Mohammad, ... | | 2019 |
Password Knowledge versus Password Management Practice VN Adama, NM Dogonyaro, VL Yisa, B Meshach, E Ayobami | | 2018 |
Evaluation of Mobile Banking Services Usage in Minna, Niger State M Baba, NM Dogonyaro, VL Yisa, OM Omobolanle | | 2018 |
Password Knowledge Versus Password Management VN Adama, NM Dogonyaro, VL Yisa, B Meshach, E Ayobami i-Manager's Journal on Computer Science 6 (3), 16, 2018 | | 2018 |
The Simulation of Path Control a nd R oute Redistribution Techniques on t he Integration of Wans w ith Different Routing Protocols CO Abdulhamid, S. M. , Yisa , V. L. , Baba , M. & Njoku JOURNAL OF SCIENCE, TECHNOLOGY, MATHEMATICS AND EDUCATION (JOSTMED) 9 (1 …, 2012 | | 2012 |
Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse Dynamics M Baba, VL Yisa INTERNATIONAL CONF CYBERSPACE GOVER, 32, 0 | | |